메뉴 건너뛰기




Volumn 3832 LNCS, Issue , 2006, Pages 626-632

Artificial rhythms and cues for keystroke dynamics based authentication

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; IMAGE QUALITY; SECURITY OF DATA; USER INTERFACES;

EID: 33744950220     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (38)

References (7)
  • 1
    • 0141868898 scopus 로고
    • Authentication by keystroke timing: Some preliminary results
    • Rand Corporation
    • Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Rand Report R-256-NSF. Rand Corporation (1980)
    • (1980) Rand Report , vol.R-256-NSF
    • Gaines, R.1    Lisowski, W.2    Press, S.3    Shapiro, N.4
  • 3
    • 0039921279 scopus 로고
    • User identification via keystroke characteristics of typed names using neural networks
    • Brown, M., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. Man-Machine Studies. 39 (1993) 999-1014
    • (1993) Int. J. Man-Machine Studies , vol.39 , pp. 999-1014
    • Brown, M.1    Rogers, S.J.2
  • 6
    • 33744957472 scopus 로고    scopus 로고
    • Apparatus for Authenticating an Individual Based on a Typing Pattern by Using a Neural Network System, Patent No. 6,151,593, Nov. 21, 2000, US Patent and Trademark Office, Washington DC 20231, 2000.
    • Cho, S., Han, D: Apparatus for Authenticating an Individual Based on a Typing Pattern by Using a Neural Network System, Patent No. 6,151,593, Nov. 21, 2000, US Patent and Trademark Office, Washington DC 20231, 2000. (2000)
    • (2000)
    • Cho, S.1    Han, D.2
  • 7
    • 3042852406 scopus 로고    scopus 로고
    • Keystroke dynamics identity verification - Its problems and practical solutions
    • Yu, E., Cho, S.: Keystroke dynamics identity verification - its problems and practical solutions. Computers and Security. 23(5) (2004) 428-440
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 428-440
    • Yu, E.1    Cho, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.